utsecnet / the-book-of-secret-knowledgeLinks
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
☆15Updated 6 years ago
Alternatives and similar repositories for the-book-of-secret-knowledge
Users that are interested in the-book-of-secret-knowledge are comparing it to the libraries listed below
Sorting:
- Logmira by Blumira has been created by Amanda Berlin as a helpful download of Microsoft Windows Domain Group Policy Object settings.☆60Updated 8 months ago
- Check_ioc is a script to check for various, selectable indicators of compromise on Windows systems via PowerShell and Event Logs. It was …☆77Updated 7 years ago
- ☆54Updated 4 years ago
- Network Appliance Backups in PowerShell☆29Updated 2 years ago
- Security-Focused O365 Management and Log Scripts☆62Updated 2 years ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆159Updated 2 years ago
- PowerShell Module for automating Tenable Nessus Vulnerability Scanner.☆88Updated 2 years ago
- Deploy and maintain Symon through the Splunk Deployment Sever☆31Updated 4 years ago
- Customized NXLog configuration used to generate data from Windows endpoints that can be leveraged by teams for better insight into host-a…☆18Updated 3 years ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆159Updated 5 years ago
- Elastic Beat for fetching and shipping Office 365 audit events☆67Updated 4 years ago
- Windows Event Forwarding subscriptions, configuration files and scripts that assist with implementing ACSC's protect publication, Technic…☆221Updated 4 months ago
- Secure and log *available* activities in your Microsoft Office 365 environment☆39Updated 6 years ago
- Powering Up Incident Response with Power-Response☆63Updated 5 years ago
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆82Updated 2 years ago
- ☆315Updated 5 years ago
- ☆34Updated 4 years ago
- Build a domain with three quick PowerShell scripts!☆29Updated 5 years ago
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 5 years ago
- Defensive Origins Training Schedule☆38Updated last year
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- Build a fast, free, and effective Threat Hunting/Incident Response Console with Windows Event Forwarding and PowerBI☆203Updated 7 years ago
- Tools by cooey comrades for cooey comrades.☆14Updated 2 years ago
- Implementing the CIS Critical Controls (almost) for Free☆86Updated 3 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- Sets up all the layers needed to log in over ssh with ssh keys☆17Updated 10 months ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆53Updated 2 years ago
- DDTTX Tabletop Trainings☆28Updated 3 years ago
- Various scripts to help you out. Mostly very scrappy, but functional. I realise Write-Host is not the way to do things, but I wrote som…☆27Updated 3 years ago
- The gse-study repo was assembled to serve as a consolidated, and comprehensive, study solution for the SANS GSE exam.☆25Updated 6 years ago